Expert answer:Describe the differences between data hiding, watermarking, and steganography. What are their respective applications and requirements? Is one a special case of another?The following are some possible applications of watermarking. Describe what they are and their requirements. What is steganography? What are the design objectives for a steganography system?What is steganalysis? What are the design objectives for a steganalysis system? What are the two types of staganalysis techniques?What is the key difference between I -frames, P -frames and B -frames in MPEG-2 video compression? Describe the advantages and disadvantages of using B -frames. Which of the above kind of frames typically requires the most and the least number of bits to encode? What is the reason for inserting I -frames into the compressed output stream relatively frequently? Data hiding refers to a technique that embeds data in a cover media. Watermarking is a special type of data hiding, where the embedded data carries information that can be used to prove the ownership or integrity of the cover media. Steganography is also another special type of data hiding, wherein the embedded data is a secrete message that is typically unrelated to the cover media. The cover media can be chosen randomly or to facilitate the conveyance of the secrete message. Because multimedia documents (audio or image or video) have a lot of redundancy, these documents are often chosen as the cover media for embedding secret messages (which themselves could be an image or plain text or encrypted text). With watermark, the embedding algorithm should be designed so that the embedded watermark is hard to remove (except for applications using fragile watermark). On the other hand, for steganography, this is usually not a concern Ownership assertion Fingerprinting Copy prevention and control Detection of unauthorized alteration (authenticate integrity of the data) Embedded watermark is used to proof the ownership of the cover media. The owner or its trusted delegates should be able to detect the presence of the watermark (with the help of the original and the secret key used to generate the watermark) even if the watermarked document is subjected to accidental or malicious alterations (such as compress/decompress, cropping, printing/scanning, shrink and then zoom). A different watermark is embedded to each sold copy of the original media. If this copy is altered or being reproduced illegally, based on the embedded watermark, the owner can track down the person who purchased the copy. The watermark contains information on how many copies can be made. A compliant recorder/copier will detect such watermark before making copies. the watermark should be such that if the media with the watermark is altered, even if slightly, then the extracted watermark is different from the original watermark. Steganography refers to the technique that embeds a secrete message in a cover media. The design objectives include: 1) the stegoed media (the cover media after embedding) should still look like a typical, normal document; 2) it should be difficult for a steganalysis system to tell the presence of a secrete message from the stegoed media. 3) the intended recipient of the stegoed media should be able to detect and decipher the embedded message reliably design objectives for a steganography system is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent. Steganalysis refers to the detection of presence of embedded data in a medium. The design objective is to maximize the “hit” rate, while minimize the “miss” rate, and in the meantime to minimize the false detection rate. Types of staganalysis techniques are: One may develop staganalysis techniques for a given known embedding method. Such methods tend to have higher detection rate, but is useless for a new embedding method. Universal steganalysis technique, on the other hand, aims to detect the presence of embedded data without knowing the embedding technique. This is possible as the embedded data are likely to change the statistics of the original media, no matter what embedding algorithms are used. I-Frame: Basic reference frame for each group of pictures — essentially a JPEG compressed image. [1] P-Frame: Coded forward difference frame w.r.t. last I or P frame B-Frame: Coded backward difference frame w.r.t. last I or P frame B-frames: Advantages: Improve code efficiency/quality. quality can be improved in the case of moving objects that reveal hidden areas; better error propagation as B-frames are not used to predict future frames. Disadvantages: Frame reconstruction requires memory buffers within the encoder and decoder to accommodate the 2 anchor frames; potentially more delays for online applications. B-frames are the most compact. I-frames are the largest. (Typically!) Inserting I-frames frequently: Differences between frames get too large — large errors — hard to track fast blocks etc. So, need to restart card with a new Iframe.
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more